RSAC

Are we leading by example?

It was a great week leading the RSA Conference Security Operations Center (SOC) Team consisting of RSA systems engineers, RSA Incident Response analysts and our partners at Cisco AMP Threat Grid. The Security Operations Center previously monitored the Black Hat conference network, but this was a first-time exhibit at RSA Conference. The team signed onto…

Leading in an Era of Chaos

Consider… American Authorities are confident that the Russian Government was behind the cyberattack on the Democratic National Committee. Did that attack change the course of the U.S. presidential election? We’ll never know. But it definitely changed the discourse that followed. The idea of a foreign power mounting a cyberattack to undermine a U.S. election went…

2017 is the Year for RSA Business-Driven Security™ Solutions

This week, RSA will be making a global announcement during the 2017 RSA Conference to formally unveil RSA Business-Driven Security solutions, a new approach to help customers manage cyber risk. This architecture, along with several concurrent solution and service announcements, enables customers to take command of their risk posture and secure what matters most. BUSINESS-DRIVEN…

Identity Comes into Focus at RSA Conference

We are less than two weeks away from RSA Conference, the world’s largest security event! This year’s theme – The Power of Opportunity – emphasizes “unity.” Clever, right? We think so. Not only is it a great time to call for unity in cybersecurity among vendors and practitioners, but also end users. Every day we’re…

RSAC Innovation Sandbox – Celebrating disruption

Fear of the unknown is a universal human trait according to anthropologist Donald Brown. In behavioral science, it’s called status quo bias- the emotional bias or preference humans have to the current state of affairs and their built in resistance to change. “Humans are allergic to change”, declared Admiral Grace Hopper, computing pioneer and 2016…

A Trip Report from RSA Conference 2016: Modern Identity Management

For anyone who went to RSA Conference 2016 to get updated on the state of modern identity management technologies and practices, you undoubtedly got your money’s worth and came back to your office with plenty of ideas on how to improve your organization’s approach. Given its foundational role in information security, the topic of identity…

Exhausted & Refreshed: My RSA Conference 2015 Recap

“In a sea change nothing is safe. Strange waves push us every way, In a stolen boat we’ll float away” – Beck from Little One With a week of recovery under my belt I’m finally able to reflect on another amazing RSA Conference. Some of my experiences were the same as years past. My feet…

RSAC 2015: Memory Forensics for IR – Leveraging Volatility to Hunt Advanced Actors

Memory forensics is a critical evidentiary goldmine that helps paint the picture of triage – a host is paramount; timing is everything. While it is well known, memory holds critical volatile information such as network connections, malware-based artifacts and other non-paged data, it also holds many of the same artifacts that were previously known to…

RSA Conference 2015: Re-Think Your Approach to Malware Analysis By Leveraging Intelligence

Attacks against secure infrastructure appear to grow in complexity and ambition with each passing year but, in reality, can be analyzed and defended against with very simple processes. Instead of viewing an attack as all-encompassing, a properly equipped security team can break down an intrusion attempt into clear sets of actions and indicators. With a…